Category Archives: Security

Hacking Sand Hill: How the cloud will help security startups lure VCs

Originally posted on Gigaom:
The computer security industry is far from an easy place to build a successful startup. Security has traditionally been controlled by a small group of established firms that maintain a vice-like grip on the major IT…

Posted in byod, cloud computing, networking, Security | Tagged , , , | Leave a comment

Box woos the enterprise with more security features, partnerships

Originally posted on Gigaom:
In what will no doubt be just one in a series of security-related news blasts coming out of the RSA Conference this week, Box is unveiling a new set of features for its business-class cloud storage…

Posted in asset management, byod, cloud computing, consumer, datacenter, EUC, mobile, Productivity, Security, storage | Tagged , , , , | Leave a comment

So NBC.com got hacked. So what?

Always enjoy reading stuff like this and figuring out how something works. It makes technology fun!

Posted in byod, cio, cloud computing, consumer, EUC, Security | Tagged , , , | Leave a comment

Cyber-rattling is a Convenient Excuse for Security Vendor Failures

Posted in asset management, byod, Productivity, Security, virtualization | Tagged , , , , | Leave a comment

Mac Automation Tutorials

Mac Automation Tutorials http://www.ienticement.com/how-to/mac-automation-tutorials/

Posted in Amazon, Apple, Productivity, Security, virtualization | Tagged , , , , | Leave a comment

2600hz, A New Way To Make The Data Center The New Telco And Replace Our Decomposing 19th-Century Phone System

2600hz, A New Way To Make The Data Center The New Telco And Replace Our Decomposing 19th-Century Phone System http://techcrunch.com/2013/02/18/2600hz-a-new-way-to-make-the-data-center-the-new-telco-and-replace-our-decomposing-19th-century-phone-system/

Posted in cloud computing, Security, vdi, virtualization | Tagged , | Leave a comment

Personalized Content Is Driving BYOD, Not The Device

Like watching TV, as an end-user I know what I want and when I need it. IT needs to determine whether it is in the device or content management space. As an enterprise architect the days of managing the device … Continue reading

Posted in byod, cio, cloud computing, consumer, EUC, Productivity, Security, virtualization | Tagged , , , , , , , | Leave a comment